netForensics, Inc Founded in 1999, netForensics is based on a culture of excellence and innovation. Our team of leading experts understands the ever-evolving security threat and compliance needs of today’s organizations. Since our early...

Outpost24 Outpost24 is the business thought leader within vulnerability management. Outpost24 develops technology for Vulnerability Management since 2001, and develops its own state of the art tools from core and up. Outpost24 is a...

OUTSCAN
OUTSCAN is a turn-key software as a service solution. Clients are able to initialize their first vulnerability scanning within minutes of registering for a...

Acunetix Securing a company's web applications is today's most overlooked aspect of securing the enterprise. Web application hacking is on the rise with as many as 75% of cyber attacks done at web application level or via the web....

Quarri In a landscape of increased regulations and a shift to web-based applications, the browser at the end point continues to be the weakest part of any network, as one wrong click of the mouse can open a company’s most...

Cloud Application Security
In the brave new world of cloud computing, how do you protect your information assets beyond the firewall?
More companies are turning to cloud computing to...

MaaS360 by Fiberlink MaaS360 by Fiberlink is the only cloud-based solution to integrate mobile device management, mobile security, application management, document sharing, and expense management into a single console.

New Methods For Remediating Botnets How the State University of New York – Old Westbury changed the playing field
by David A. Lissberger President and CEO Sentinel Intrusion Prevention Systems
With contributions and review by Marc Seybold SUNY – Old Westbury Chief Information Officer
Copyright 2009 Econet.com, Inc. http://www.networkcloaking.com (972) 991-5005
You have the right to be secure. ...

This paper explores the use of collective intelligence with sophisticated intrusion prevention technologies, but is accomplished in a way that both technical and non-technical readers can appreciate. Although Sentinel IPS products are discussed openly, it is the security concepts themselves that have great value for the reader in understanding the defense of any network.
Sentinel IPS(ci)™ is the ...

In 2002, EcoNet.com, Inc. set up the Sentinel IPS Development Team with an express
mission of “changing the intrusion game”. We started from scratch and looked at
Intrusion Prevention in new ways. Since we were not a firewall or router maker we were
free from the constraints in our thinking that are imposed by one’s heritage. The team
operated independently and had no preconceptions as to ...

Written by analyst firm, Reymann Group
In this paper we will explore the meaning of Governmance, Risk, Compliance (GRC), how information technology (IT) GRC creates value within an organization, and why Intrusion Prevention Systems are a key part of a successful IT GRC strategy.
As we begin to explore these IT GRC and Intrusion Prevention System (IPS) practices, think about your company's ...

Intrusion Prevention System
Research Library

What Is Network Situational Awareness? Cybersecurity has evolved into a complex array of multiple manufacturers specialized equipment. While this type of stovepipe deployment can be cost justified for the HQ and larger remote sites, it has a number of disadvantages when trying to duplicate the functionality at smaller remote sites and offices. Basic cyber hygiene (the "best-practice" of network ...

Zero-day attacks. No other vulnerability today strikes more fear into an IT administrator responsible for protecting the company’s most valuable assets—its strategic information and the systems that store, process and communicate that information.
Firewalls and antivirus software remain an important line of defense against malicious code entering your computing environment—or worse, actually ...

The ultimate in disposing one's troops is to be without ascertainable shape. Then the most penetrating spies cannot pry in, nor can the wise lay plans against you.
This can be a powerful intrusion prevention strategy, if we apply this way of thinking to the protection of your network. Imagine your network and its resources were “without ascertainable shape”. If your network were invisible to ...

This paper explores the use of collective intelligence with sophisticated intrusion prevention technologies, but is accomplished in a way that both technical and non-technical readers can appreciate. Although Sentinel IPS products are discussed openly, it is the security concepts themselves that have great value for the reader in understanding the defense of any network.
Sentinel IPS(ci)™ is ...

New Methods For Remediating Botnets How the State University of New York – Old Westbury changed the playing field
by David A. Lissberger President and CEO Sentinel Intrusion Prevention Systems
With contributions and review by Marc Seybold SUNY – Old Westbury Chief Information Officer
Copyright 2009 Econet.com, Inc. http://www.networkcloaking.com (972) 991-5005
You have the right to be ...

Company descriptions and contact
information are quoted
from the company's website or other promotional information. Questex is not responsible for
the accuracy
of this information. Unless specifically noted, Questex is not sponsored by, affiliated with
or otherwise
connected with any of the listed companies.